Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security NewswireAccess ManagementIdentity Management

Nearly Half of Americans Likely to Use Voice Recognition for Personal Verification

April 11, 2018

A new Pindrop survey has found the vast majority (81%) believe there are benefits to using voice recognition as a form of personal verification.

Not only do 81% find benefits, said the survey, but nearly half of Americans (48%) said they would be likely to use voice recognition as a form of personal verification.

The study also assessed consumer engagement with financial institutions, retailers, healthcare providers and other major omnichannel organizations. Findings indicate that roughly half of Americans contacted financial service companies (49%), healthcare companies (59%), insurance companies (54%), and telco companies (60%), via phone with a customer service inquiry in the last 12 months. About one in ten Americans contacted healthcare companies (15%), insurance companies (9%) and financial service companies (11%) via phone more than five times per year.

Consumer Frustration

Consumers may be dissatisfied with current verification methods used to protect their personal information. More than one in four Americans who have accessed an account at a healthcare company (28%) or TV/telecom company (27%) by phone expressed frustration with their experience. Among those who have found it difficult to access their accounts* by phone, burdensome requirements to answer numerous identity verification questions is the cause of this difficulty for over one quarter of them (28%).  Additionally, nearly one in five (18%) have found it difficult because they forgot the answers to their security questions and were locked out of their accounts.

“We are ushering in a new era of passive voice authentication that will create opportunities for brands to interact with their customers,” said Scott Rose, SVP of Product, Pindrop. “As consumers go beyond their phones and increase interactions with voice activated devices, it is crucial not to confuse personalization with security and identification.”

Fear, Uncertainty, and Doubt Abound

One key finding in the study highlights that roughly four out of five Americans (81%) believe there are benefits to using voice recognition as a form of personal verification. However, concerns remain as 94% believe there are drawbacks to this process. The top reasons for concern include:

  • 61%: May not work well because of background noise (channel independence)
  • 60%: May not work accurately every time (low EER)
  • 48%: Voice can be cloned and used against them (voice spoofing)
  • 43%: May have difficulty recognizing accents
  • 39%: May not be secure
  • 36%: Requires you to speak loudly and clearly (channel independence)
  • 31%: Lack of info on how voice as personal verification works

“In January, Pindrop released the first-of-its-kind Deep Voice™ biometric engine that is able to recognize a consumer by their voice, even with short command-like utterances in a passive manner,” Rose said. “Pindrop®Labs first looked at the limitations of current voice biometrics and specifically designed a voice biometric engine, in a deep neural architecture, that  addresses the top consumer concerns such as channel independence, the emerging threat of voice synthesis and accuracy rates.”

The Frictionless Conversational Economy

In the emerging conversational economy, brands are reimagining voice activated consumer experiences. Enterprise level security and multi-factor authentication is the necessary next step for all industries creating new opportunities for frictionless customer experiences. As more channels become voice-activated, fraudsters will leverage emerging technologies such as voice synthesis to impersonate consumers. Today, voice fraud costs organizations in the U.S. $14 billion each year within call centers alone.

KEYWORDS: identity (ID) management verification voice recognition

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • cyber6-900px.jpg

    Nearly Half of Americans Willing to Give Brands a Pass for a Data Breach

    See More
  • CCPA california privacy requests cost companies much time and money

    Nearly half of privacy requests last year were to stop the sale of personal data

    See More
  • eye-scan1-900px.jpg

    More Than Half of U.S. Adults Trust Law Enforcement to Use Facial Recognition Responsibly

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing